Total vulnerabilities in the database
Buffer overflow in sshd in OpenSSH 2.3.1 through 3.3 may allow remote attackers to execute arbitrary code via a large number of responses during challenge response authentication when OpenBSD is using PAM modules with interactive keyboard authentication (PAMAuthenticationViaKbdInt).
Software | From | Fixed in |
---|---|---|
openbsd / openssh | 3.1 | 3.1.x |
openbsd / openssh | 3.0.2p1 | 3.0.2p1.x |
openbsd / openssh | 2.1.1 | 2.1.1.x |
openbsd / openssh | 3.2.3p1 | 3.2.3p1.x |
openbsd / openssh | 3.1p1 | 3.1p1.x |
openbsd / openssh | 2.5.1 | 2.5.1.x |
openbsd / openssh | 3.0 | 3.0.x |
openbsd / openssh | 2.2 | 2.2.x |
openbsd / openssh | 3.2 | 3.2.x |
openbsd / openssh | 1.2.3 | 1.2.3.x |
openbsd / openssh | 3.0.1p1 | 3.0.1p1.x |
openbsd / openssh | 2.1 | 2.1.x |
openbsd / openssh | 3.3 | 3.3.x |
openbsd / openssh | 3.2.2p1 | 3.2.2p1.x |
openbsd / openssh | 3.0.2 | 3.0.2.x |
openbsd / openssh | 3.0.1 | 3.0.1.x |
openbsd / openssh | 2.9.9 | 2.9.9.x |
openbsd / openssh | 1.2.2 | 1.2.2.x |
openbsd / openssh | 2.9p1 | 2.9p1.x |
openbsd / openssh | 2.9 | 2.9.x |
openbsd / openssh | 2.5.2 | 2.5.2.x |
openbsd / openssh | 2.3 | 2.3.x |
openbsd / openssh | 2.5 | 2.5.x |
openbsd / openssh | 3.0p1 | 3.0p1.x |
openbsd / openssh | 3.3p1 | 3.3p1.x |
openbsd / openssh | 2.9p2 | 2.9p2.x |